System and method for providing a data structure having different-scheme-derived portions

JB Fishbeck, WF Heapes, M Jenks - US Patent 10,068,099, 2018 - Google Patents
In certain embodiments, first and second information to be represented in a data structure
(accessible to a plurality of entities) may be obtained. First and second sets of permissions …

Document management cryptography

G Samid - US Patent 11,290,253, 2022 - Google Patents
BRIEF SUMMARY OF THE INVENTION Executive Summary: Documents used to manage
projects 5 involving large number of people pose a formidable orga nizational challenge …

System and method for data sharing via a data structure having different-scheme-derived portions

JB Fishbeck, WF Heapes, M Jenks - US Patent 10,078,759, 2018 - Google Patents
In certain embodiments, a data structure including first and second data structure portions
may be obtained, where the first data structure portion is generated based on a first …

Domain isolated processing for coalition environments

RD Bean, JA Marek, EC Tubbs - US Patent 11,601,277, 2023 - Google Patents
US11601277B1 - Domain isolated processing for coalition environments - Google Patents
US11601277B1 - Domain isolated processing for coalition environments - Google Patents …

Mesh network for resource-constrained devices

R Hamila, O Ellabban, A Gastli, U Hijawi… - US Patent …, 2023 - Google Patents
IoT frameworks require flexible and scalable communication and security schemes that can
be deployed on devices of low computational capabilities and memory (eg, resource …

Secure multi-party computation attribution

A Knox - US Patent 11,245,536, 2022 - Google Patents
Secure multi-party computations may be used to get attri bution results without
compromising user privacy. A content provider and an advertiser may each sign a …

Method and apparatus for policy hiding on ciphertext-policy attribute-based encryption

J Qu, F Xia, X Ge - US Patent 11,316,662, 2022 - Google Patents
Various embodiments relate to a method and apparatus for policy-hiding on ciphertext-
policy attribute based encryption, the method including the steps of categorizing each of a …

Key-based cross domain registration and authorization

L Zhang - US Patent 11,627,132, 2023 - Google Patents
the target domain checks validity of the key and the token. In response to both the key and
the token being valid, the access from the application of the source domain is allowed.a …